ICs & Semiconductors
Stopping the counterfeiters
Alexander Kurz looks at how using authentication devices can not only prevent product counterfeiting but also prevent potential lost revenues
M
anufacturers of microprocessor- based systems where the product manufacturing costs are low but the development and marketing costs are high often find themselves victims of product counterfeiting attacks. Fraudulent manufacturers have little or no
development costs and therefore can make a decent profit selling “clones” at a much lower price than the legitimate manufacturer. Since counterfeiters are often hidden in countries outside cooperative legal jurisdictions, fighting them directly is difficult, if not impossible.
Fortunately, there is a simple solution: raise the
counterfeiter’s
“development” cost to the point where
counterfeiting is no longer viable. But this must be done without significantly changing the legitimate manufacturer’s product cost. The most complete and cost-effective way to thwart this type of attack on a
company’s products is to integrate a hardware authentication device into the product itself.
pickering
44 October 2011 Components in Electronics
www.cieonline.co.uk
Page 1 |
Page 2 |
Page 3 |
Page 4 |
Page 5 |
Page 6 |
Page 7 |
Page 8 |
Page 9 |
Page 10 |
Page 11 |
Page 12 |
Page 13 |
Page 14 |
Page 15 |
Page 16 |
Page 17 |
Page 18 |
Page 19 |
Page 20 |
Page 21 |
Page 22 |
Page 23 |
Page 24 |
Page 25 |
Page 26 |
Page 27 |
Page 28 |
Page 29 |
Page 30 |
Page 31 |
Page 32 |
Page 33 |
Page 34 |
Page 35 |
Page 36 |
Page 37 |
Page 38 |
Page 39 |
Page 40 |
Page 41 |
Page 42 |
Page 43 |
Page 44 |
Page 45 |
Page 46 |
Page 47 |
Page 48 |
Page 49 |
Page 50 |
Page 51 |
Page 52